A) Malware B) Spyware C) Spam D) Viruses
A) A term reffering to the Stone Age B) A phase in the Middle Ages C) All of the above D) The current era characterized by the use of digital technologies
A) Larged-sized computer hardware B) Extremely large physical documents C) Extremely large physical documents D) Massive datasets that require advanced analytics
A) 2003 B) 2005 C) 2001 D) 2000
A) Blogs B) Social Networking C) Wikis D) Video Sharing Sites
A) Charles Babbage B) John von Neumann C) Ada Lovelace D) Grace Hopper
A) Edison B) Babbage C) Mauchly D) Byron
A) Computer B) Analytical Engine C) Calculator D) Telephone
A) A type of computer programming language B) The internet used exclusively for gaming C) The latest version of internet browsers D) A network of interconnected smart devices that communicate and share data
A) Hacking B) Clicking C) Phishing D) Fishing
A) Improved user control over device functionalities B) Limited data storage capabilities C) Unauthorized access to personal data D) Excessive device durability
A) 5G B) Internet of Things C) Blockchain Data D) Augmented Reality
A) Limited access to medical information B) Improved patient care and treatment options C) Increased paperwork and administrative tasks D) Slower response time in emergencies
A) Limited access to movies and music B) Enabled on-demand and personalized entertainment choices C) Increased cost of entertainment D) Decreased options for entertainment
A) Twitter B) Facebook C) Tiktok D) Instagram
A) Social Constructivism B) Technological Determinism C) None of the above D) Technological Change
A) Led to economic recession B) Enhanced productivity and efficiency C) Slowed down economic growth D) Increased unemployment rates
A) Prison major B) Prison mayor C) Reclusion temporal D) Reclusion temporary
A) Cloud Computing B) Wi-Fi Eavesdropping C) Automation D) Virtual Reality
A) Wirelessly through the internet B) Through wired telephone lines C) All of these D) Through postal mail
A) Stealing someone's personal information to impersonate them for fraudulent purposes B) Pretending to be someone else in online forums C) Creating fake social media profiles D) A harmless online park
A) Malware B) Virus C) Worms D) Spyware
A) Using the same password across multiple accounts B) Using a combination of uppercase, lowercase, numbers, and symbols C) Regularly changing passwords every few years D) Using the same password across multiple accounts
A) Incompatibility with modern networks B) Excessive power consumption C) Vulnerabilities in IoT device security D) Lack of device connectivity
A) To convey emotion or tone in text-based conversation B) To make the message longer C) To confuse the recipient D) To show off one's technical skills
A) Internet of Things B) Augmented Reality C) Virtual Reality D) Artificial Intelligence
A) Students can access teaching materials from all over the world B) Reduced personal interaction C) Can help people to communicate trough online games D) Increase in access to information and services that has accompanied the growth of the internet
A) 2023 B) 2008 C) 2020 D) 2014
A) Through wired telephone lines B) Through postal mail C) Wirelessly through the internet D) Wirelessly through the internet
A) Technological Determinism B) None of the above C) Social Constructivism D) Technological Change
A) Ransomware B) Spam C) Trojan Horses D) Spyware
A) Grace Hopper B) Blaise Pascal C) John Mauchly D) Charles Babbage
A) Wi-Fi Eavesdropping B) Trojan Horses C) Viruses D) Worms
A) Communication devices B) Communication of things C) Internet of Things D) Internet devices
A) Z1 B) ED1 C) AI D) 5G
A) Malware B) Spamming C) Pharming D) Phishing
A) Work from outside of the Country B) All of the above C) Work inside the Company D) Teleworking (Work from Home)
A) They attempt to trick individuals into revealing sensitive information B) They are always detected and prevented by antivirus software C) They involve physical break-ins D) They are always detected and prevented by antivirus software
A) Republic Act No. 10175 Cybercrime Prevention Act of 2012 B) Republic Act No. 10173 Data Privacy Act of 2012 C) Republic Act No. 10175 Cybercrime Prevention Act of 2013 D) Republic Act No. 10173 Data Privacy Act of 2013
A) Mark Zuckerberg B) Timothy John Berners-Lee C) Jack Dorsey D) Vinton Gray
A) Trojan Horse B) Spyware C) Ransomware D) Adware
A) Web 2.0 B) Web 1.0 C) Web 3.0 D) Web 1.1
A) Abacus B) Phoenician Alphabet C) Petroglyphs D) Papyrus Plant
A) Data Communication B) Data transmission C) Dataset D) Database
A) Unauthorized access to personal data B) Improved user control over device functionalities C) Excessive device durability D) Limited data storage capabilities
A) Standard printer B) Traditional desktop computer C) Smart thermostat D) Basic mobile phone
A) Decreased use of natural resources B) Increased pollution and waste C) Positive contribution to environmental conservation D) No impact on the environment
A) Fast downloading of files B) Conducting online surveys C) Real-time data transmission of audio or video content D) Securing online transactions
A) Augmented Reality B) Virtual Reality C) Augmented Virtual D) Blockchain Data
A) Blockchain Communication B) Blockchain Message C) Blockchain Data D) Blockchain Reality
A) 2014 B) 2023 C) 2008 D) 2020
A) Limited interaction with teachers B) Increased travel time to physical classrooms C) Improved access to a variety of learning materials D) Decreased access to educational resources
A) Virtual Reality B) Wi-Fi Eavesdropping C) Automation D) Cloud computing
A) Enables companies to automate processes and reduce labor costs. It also cuts down on waste and improves service delivery, making it less expensive to manufacture and deliver goods B) Helps people live and work smarter, as well as gain complete control over their lives C) One of the most important technologies of everyday life, and it will continue to pick up steam as more businesses realize the potential of connected devices to keep them competitive D) All of the above
A) Because of many modern technologies B) Because of the COVID-19 pandemic many business faced significant challenges and turned into online businesses C) All of the above D) Because of the new gadget that will be released
A) Viruses B) Malware C) Hacking D) Identity theft
A) All of the above B) Decreased need for strategic planning C) Increased reliance on intuition D) Improved data-driven decision-making through analytics
A) Analog computing B) Mainframe computing C) Blockchain D) Cloud computing
A) To raise awareness about potential internet threats and safe online practices B) To increase vulnerability to cyber attacks C) To teach hacking techniques D) To promote ethical hacking practices
A) File server B) Application server C) Policy server D) Mailserver
A) Always, to ensure clarity and professionalism B) Only when communicating with close friends C) Only when writing formal emails D) Never, because it's not important in the Digital world
A) Cybersex B) Cyber Defamation C) Child Pornography D) Cyberbullying
A) IPsec B) HTTPS C) FTP D) SSH
A) Penalty atleast Php 200,000 and or prison mayor B) Penalty atleast Php 5,000 C) Prison mayor only D) Penalty atleast Php 500,000 and or prison mayor
A) Internet Security Protocol B) Internet Service Provider C) Internet Support Program D) Internet Search Provider
A) Network and Etiquette B) None of the above C) Networking and Technology D) Internet and Etiquette
A) Penalty of 6-12 years of imprisonment or prison mayor B) Penalty at least Php 500, 000 and or prison mayor C) Penalty of 20,000 D) Penalty of 1 year of imprisonment or prison mayor
A) Copyright infringement B) Piracy C) Plagiarism D) Computer Addiction
A) A social media platform B) A set of rules for polite and respectful behavior on the Internet C) A social media platform D) A type of computer virus
A) Prison major B) Prison mayor C) Reclusion temporary D) Reclusion temporal
A) The email is spam and should be deleted B) The sender is emphasizing the importance of the email C) The sender is shouting or being rude D) The email contains confidential information
A) A software that provides free services B) A legitimate form of remote work C) Malicious software that encrypts a victims data and demands a ransom for its release D) A software that provides free services
A) Amazon B) YouTube C) eBay D) Facebook
A) Byt B) Byte C) Bit D) Bait
A) Educational Website B) Personal Website C) Nonprofit Website D) Media Website
A) Browser B) Server C) DNS D) IP address
A) The science of artificial intelligence B) The practice of securing computer systems and networks from cyber threats C) A type of computer game D) The study of the stock market
A) Thou shall avoid eye contact B) Thou shall be prompt C) Thou shall be prompt D) Thou shall respect personal space
A) Pinterest B) Blogger C) Wordpress D) Tumbler |